[BACK]Return to handle_spi_needed.c CVS log [TXT][DIR] Up to [local] / src / sbin / photurisd

File: [local] / src / sbin / photurisd / Attic / handle_spi_needed.c (download)

Revision 1.5, Sun Jan 28 22:45:09 2001 UTC (23 years, 4 months ago) by niklas
Branch: MAIN
CVS Tags: OPENBSD_3_1_BASE, OPENBSD_3_1, OPENBSD_3_0_BASE, OPENBSD_3_0, OPENBSD_2_9_BASE, OPENBSD_2_9
Changes since 1.4: +3 -1 lines

$OpenBSD$

/*	$OpenBSD: handle_spi_needed.c,v 1.5 2001/01/28 22:45:09 niklas Exp $	*/

/*
 * Copyright 1997-2000 Niels Provos <provos@citi.umich.edu>
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *      This product includes software developed by Niels Provos.
 * 4. The name of the author may not be used to endorse or promote products
 *    derived from this software without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */
/*
 * handle_spi_needed:
 * receive a SPI_NEEDED packet; return -1 on failure, 0 on success
 *
 */

#ifndef lint
static char rcsid[] = "$OpenBSD: handle_spi_needed.c,v 1.5 2001/01/28 22:45:09 niklas Exp $";
#endif

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "config.h"
#include "photuris.h"
#include "packets.h"
#include "state.h"
#include "cookie.h"
#include "buffer.h"
#include "packet.h"
#include "encrypt.h"
#include "validity.h"
#include "attributes.h"
#include "secrets.h"
#include "scheme.h"
#include "log.h"
#include "spi.h"
#ifdef IPSEC
#include "kernel.h"
#endif

int
handle_spi_needed(u_char *packet, int size, char *address, 
			char *local_address)
{
        struct packet_sub parts[] = {
	     { "Verification", FLD_VARPRE, 0, 0, },
	     { "Attributes", FLD_ATTRIB, FMD_ATT_FILL, 0, },
	     { NULL }
	};
        struct packet spi_msg = {
	     "SPI Needed", 
	     SPI_NEEDED_MIN, 0, parts
	};
	struct spi_needed *header;
	struct stateob *st;
	struct spiob *spi;
	u_int8_t *attributes;
	u_int16_t i, attribsize, tmp;
	u_int8_t signature[22];  /* XXX - constant */

	if (size < SPI_NEEDED_MIN)
	     return -1;	/* packet too small  */

	header = (struct spi_needed *) packet;

	st = state_find_cookies(address, header->icookie, header->rcookie);
	if (st == NULL) {
	     packet_size = PACKET_BUFFER_SIZE;
	     photuris_error_message(st, packet_buffer, &packet_size,
				    header->icookie, header->rcookie,
				    0, BAD_COOKIE);
	     send_packet();
	     return 0;
	}

	if (st->phase != SPI_UPDATE && st->phase != SPI_NEEDED)
	     return 0;     /* We don't want this packet */

	/* Decrypt message */
	tmp = size - SPI_NEEDED_MIN;
	if (packet_decrypt(st, SPI_NEEDED_VERIFICATION(header), &tmp) == -1) {
	     log_print("packet_decrypt() in handle_spi_needed()");
	     goto verification_failed;
	}

	/* Verify message structure*/
	if (packet_check((u_int8_t *)header, size - packet[size-1], &spi_msg) == -1) {
	     log_print("bad packet structure in handle_spi_update()");
	     return -1;
	}

	i = get_validity_verification_size(st);
	if (!i || i != parts[0].size || i > sizeof(signature)) {
	     log_print("verification size mismatch in handle_spi_needed()");
	     goto verification_failed;
	}
	bcopy(parts[0].where, signature, i);
	
	attributes = parts[1].where;
	attribsize = parts[1].size;

	if (!isattribsubset(st->oSPIoattrib,st->oSPIoattribsize,
			    attributes, attribsize)) {
	     log_print("attributes are not a subset in handle_spi_needed()");
	     return 0;
	}

	if (!verify_validity_verification(st, signature, packet, size)) {
	verification_failed:
	     log_print("verification failed in handle_spi_needed()");
	     packet_size = PACKET_BUFFER_SIZE;
	     photuris_error_message(st, packet_buffer, &packet_size,
				    header->icookie, header->rcookie,
				    0, VERIFICATION_FAILURE);
	     send_packet();
	     return 0;
	}

	if (st->uSPIoattrib != NULL)
	     free(st->uSPIoattrib);

	if((st->uSPIoattrib = calloc(attribsize, sizeof(u_int8_t))) == NULL) {
	     log_error("calloc() in handle_spi_needed()");
	     return -1;
	}
	bcopy(attributes, st->uSPIoattrib, attribsize);
	st->uSPIoattribsize = attribsize;

	/* Delete old attributes, make_spi will make new */
	if (st->oSPIattrib != NULL) {
	     free(st->oSPIattrib);
	     st->oSPIattrib = NULL;
	     st->oSPIattribsize = 0;
	}
	if (make_spi(st, local_address, st->oSPI, &(st->olifetime),
		     &(st->oSPIattrib), &(st->oSPIattribsize)) == -1)
	     return -1;

	packet_size = PACKET_BUFFER_SIZE; 
	if (photuris_spi_update(st, packet_buffer, &packet_size) == -1) {
	     log_print("photuris_spi_update() in handle_spi_needed()");
	     return -1;
	}
	send_packet(); 

	/* Insert Owner SPI */
	if ((spi = spi_new(st->address, st->oSPI)) == NULL) {
	     log_print("spi_new() in handle_spi_needed()");
	     return -1;
	}
	if ((spi->local_address = strdup(local_address)) == NULL) {
	     log_error("strdup() in handle_spi_needed()");
	     return -1;
	}
	bcopy(st->icookie, spi->icookie, COOKIE_SIZE);
	spi->flags |= SPI_OWNER;
	spi->attribsize = st->oSPIattribsize;
	spi->attributes = calloc(spi->attribsize, sizeof(u_int8_t));
	if (spi->attributes == NULL) {
	     log_error("calloc() in handle_spi_needed()");
	     spi_value_reset(spi);
	     return -1;
	}
	bcopy(st->oSPIattrib, spi->attributes, spi->attribsize);
	spi->lifetime = time(NULL) + st->olifetime;

	make_session_keys(st, spi);

	spi_insert(spi);
	spi_update_insert(spi);
#ifdef IPSEC
	kernel_insert_spi(st, spi);
#endif
	return 0;
}